The Latest in IT Security

Posts Tagged ‘raw resource’

Those last few months, we have been using and tuning a data mining engine developed by researchers of Telecom ParisTech. The tool is named Alligator, mostly because we believe alligators are hungry animals 🙂 (and a little because this means “_AnaLyzing maLware wIth partitioninG and probAbiliTy-based algORithms_”). Integrated in our own crawling, property extraction and […]

Read more ...

The evolution of Android malware has made incontestable progress in the last few years and it often follows in the footsteps of PC-based malware, except that it happens at an accelerated pace.Often, malicious apps gain control of a system in several steps, using different modules. There is typically only one initial module which, once it […]

Read more ...


Categories

FRIDAY, APRIL 19, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments